how-to block ads
reply to Pv8man
Re: Competition Ok, where to start here...
First that is for MD5 hash sums, Not for RC cipher used on a standard router.
secondly much of the work is precomputed - the WPA cipher "salts" the pass-phrase based on the SSID making it immune to this type of attack ( even with a Precomputed hash table it still only works with dictionary attacks)
Completely wrong on all counts
winsyrstrifeRiver City BouncePremium
said by DataRiker:To be clear, I'm not trying to disagree with here, but, I feel it's safe to say, the majority (80%? Maybe I'm being too generous) of WPA keys are not complex. Maybe the comments should be pointing to the end-users' weak password complexity, instead of outright saying WPA is weak / WPA can be cracked with ease.
The key is only as strong as one wants it to be. Using a simple keys like the video is highly misleading.
The cipher is WPA is not broke nor has there even been a DEMONSTRATED weakness.A complex key will stop a bruteforce attack in its tracks.
Given that, the video is indeed misleading to prove it's own point.
I don't think that app would fare too well against a password in 3 different languages with unique slang and random numbers.
-Edit-Replied to wrong post , but you should understand if you read all the replies.
"Suddenly everything is fainting, falling from a broken ladder's rung. There's a jolt exhilarating from the phone I'm holding...
I hear the words of what I'll become, how eager the hands that reach for love." - Blind Melon - New Life